Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15/07/2024, 07:03

General

  • Target

    a3656c2de7298414af4d00be18e74570N.exe

  • Size

    54KB

  • MD5

    a3656c2de7298414af4d00be18e74570

  • SHA1

    476c6b4e6d6c907877f73a9c0176c1d998455245

  • SHA256

    c7bf44cd65bcf9c68fac21b0e657f9f37507718fabaf490991bb4fcb38b76b6f

  • SHA512

    c0373086543a72cb7a7c98c31973452732530294c6264fd96b2f8acb62da057b9b82c804b414186f4e29d9f07aa12fdf9624174df12a52889de14a11d9a05f74

  • SSDEEP

    768:kBT37CPKKIm0CAbLg++PJHJzIWD+dVdCYgck5sIZFlzc3/Sg2aDM9uA9DM9uAFIC:CTWn1++PJHJXA/OsIZfzc3/Q8IZv2j

Score
9/10

Malware Config

Signatures

  • Renames multiple (3215) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3656c2de7298414af4d00be18e74570N.exe
    "C:\Users\Admin\AppData\Local\Temp\a3656c2de7298414af4d00be18e74570N.exe"
    1⤵
    • Drops file in Program Files directory
    PID:2948

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-2660163958-4080398480-1122754539-1000\desktop.ini.tmp

          Filesize

          54KB

          MD5

          7633f7e17e7d0fcaa7cf836e0a6ae053

          SHA1

          e71af0110c7f3a4bc6224301cf54768be2bb4312

          SHA256

          94e1850116144ef5380e0f7819417a2c605dc0ea64b6b26be1f490738fdc18bd

          SHA512

          67032c15da8a6f0de364f0640c2dbd9c8eab3e039792c39012c8e97e51fc694182fe6e58b09ce5e513fd9224b27610504dddf9f9bbcb9b5398553041ed5b5f8f

        • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

          Filesize

          63KB

          MD5

          c3377c80389e156ea72aea8727ca1bba

          SHA1

          7cb6a7dd8a6b068d9372311bfc416c8c4ae8d787

          SHA256

          574a10592ca8ef5a19cf6d70dd6b66773a75cbbbbe3e9294af7f67c44e9734e8

          SHA512

          415fded7cf60ccbc2a719317af881e4e2ea92129e361b70d8df408c72501927787586006afe0258b7bd05469210c4ade6895e62dc058acd9f2eeab162e41f433

        • memory/2948-0-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB

        • memory/2948-76-0x0000000000400000-0x000000000040A000-memory.dmp

          Filesize

          40KB